Internet Use Policy

The Internet is a global electronic information infrastructure. It is a network of networks used by educators, business, government, the military, organizations and private individuals. In schools and libraries, the Internet can be used to educate, inform, communicate, and entertain. As a learning resource, the Internet is similar to books, magazines, video, CD-ROM, and other information sources.

Users are advised that e-mail and/or Internet correspondence is not privileged or confidential. From time to time, communications may be monitored by the administration to ensure that Internet use is in support of school goals.

Users:- Have the privilege to access the Internet and to exchange information. - Have a conditional privilege to request newsgroups from the Internet in order to facilitate real-time learning with members on the network. Students are responsible for getting approval from their teachers for all subscriptions to newsgroups, lists-serves and similar files. - Have the conditional privilege to send e-mail to any member on the Internet. - Are expected to use appropriate language that is not offensive or embarrassing to the school and to abide by all rules of etiquette. - Must use their student account in support of their education and consistent with the educational objectives of ALTA VISTA. - Will not create a BIOS password on any Leona machine. - Are not authorized to use teacher/staff-designated computers. While exercising privileges to use the Internet as an educational resource, users shall also monitor and accept the responsibility for all material received.

Users have the responsibility to maintain the integrity of the electronic mail system and to be responsible for all mail received under their user account. Users have the responsibility to report violations of privacy to an Internet supervisor.

Users may not knowingly receive electronic mail containing pornographic material, inappropriate information, or text-encoded files that are potentially dangerous to the integrity of the hardware on school premises. Users must report all inappropriate materials (solicited or unsolicited) to their teacher.

All files and programs on the computer belong to someone. Users may not modify, erase, rename, or make unusable anyone else's files or programs.

Users have the responsibility to keep copyrighted software of any kind from entering the school via the Internet. Users have the responsibility of keeping all pornographic material, inappropriate text files, or files dangerous to the integrity of the network from entering the school via the Internet.

Users may not modify, copy, or transfer any software provided by the school, faculty, or another student without permission from the originator.

Users may not copy copyrighted software. It is generally illegal to copy any software that has a copyright. The use of illegally copied software is considered a criminal offense and is subject to criminal prosecution.

Users:- May not intentionally introduce a computer virus. - May not deliberately use the computer to annoy or harass others. For example: making accessible any obscene, abusive, or threatening messages is not allowed. - May not intentionally damage the system, damage information not belonging to the user, misuse system sources, or allow others to misuse system sources. - May not tamper with equipment except as specifically directed by the teacher.- May not use the network for financial or commercial gain.

Users must stay within the file size limits defined by the facilitator of the network.

Users are expected to abide by the generally accepted rules of network etiquette. These include the following:

- Be polite. Do not write or send abusive messages to others. - Use appropriate language. Do not swear, use vulgarities or any other inappropriate language. - Do not reveal a personal address or phone number or those of students. - Note that e-mail is not guaranteed to be private. People who operate the system do have access to all mail. Messages relating to or in support of illegal activities may be reported to the authorities. - Assume that all communications and information accessible via the network are private property. - Keep paragraphs and messages short and to the point. - Use the "subject" line, and make it as descriptive as possible. - Include your signature at the bottom of e-mail messages. Your signature footer should include your name, position or grade level, school, and Internet address. - Capitalize words only to highlight an important point or to distinguish a title or heading. - *Asterisks* surrounding a word also can be used to make a stronger point. Capitalizing whole words that are not titles is generally termed as SHOUTING! Limit line length and avoid control characters. Users are not to use the network for wasteful or frivolous purposes such as playing network games.